SlideShare a Scribd company logo
1 of 12
Why Cloud? - A Review Of
Cloud Adoption Determinants
In Organizations
Aleksandre Asatiani, Aalto University School of Business, Helsinki, Finland.
ECIS 2015, Münster, Germany.
Motivation
- Inconclusive results across studies.
- Lack of high-ranking publications on cloud adoption.
- No thorough reviews summarizing empirical findings.
Methods
Literature search
- 7 databases: AISel; EBSCOHost; Google Scholar; Proquest;
ScienceDirect; Scopus; Web of Science;
- 6 search terms: “Cloud adoption“; “Cloud computing adoption“;
“SaaS adoption“; “IaaS adoption“; “PaaS adoption”; “XaaS
adoption“;
- 5 criteria: Published peer-reviewed articles; original empirical
studies; adoption in organizations; clearly identified adoption
factors;
Search results
- 76 articles after manual review of titles and abstracts.
- 31 articles for the first step of the review.
- 18 articles for the second step of the review.
Step 1
Goal: Identify cloud adoption factors used in previous
studies.
Approach: Concept matrices – identify, code, group.
Outcome: 5 adoption categories, 43 adoption factors.
Step 2
Goal: Explore empirical evidence behind adoption factors
and adoption decision.
Approach: Systematic review (Jeyaraj et al. 2006).
Outcome: Set of cloud adoption determinants.
Findings
Adoption factors categories
Drivers 11 items
1. Cost advantage
2. Relative advantage
3. Accessibility
4. Strategic flexibility &
adaptability
5. Implementation times
Barriers 14 items
1. Security & privacy
2. Cost unpredictability
3. Complexity
4. Lack of standards in SLAs
5. Technological limitations
Organization 7 items
1. Compatibility
2. Management support
3. Organization size
4. Transaction costs
5. Previous experience with
cloud
Cloud Providers 5 items
1. Provider reputation
2. Provider competences
3. Customer support
4. Economics of scale
5. Location of data
External
factors 6 items
1. Legal issues
2. Competitive pressure
3. Social influence/peer pressure
4. Shared best practices
5. Partner pressure
Determinants of adoption
argued in case of qualitative studies, relationships between independent variables and adoption of
cloud. I used the five categories created on the first step of the analysis to draw a framework for
summarizing findings (Figure 2). These findings present determinants of cloud adoption, which
proved as relatively reliable predictors, backed up by empirical evidence.
Adoption of cloud
Drivers of adoption
Cost advantage ++
Fast implementation ++
Opportunities for innovation ++
Strategic flexibility +
Focus on core competences+
Accessibility +
Trialability +
Relative advantage +
Online collaboration +
Inhibitors of adoption
Security & privacy --
Performance risks --
Economic risks --
Lock-in –
Organization
Management support ++
Attitudes towards technology +
External environment
Partner pressure ++
Cloud providers
Provider reputation ++
(++) More than 80% of the evidence is positively significant
(+) 60% to 80% of the evidence is positively significant
(--) More than 80% of the evidence is negatively significant
(-) 60% to 80% of the evidence is negatively significant
Figure 2. Cloud adoption determinants based on cloud adoption literature.
After coding relationships according to a direction and significance, I followed Jeyaraj et al. (2006),
Future research
- Further exploration of underrepresented categories.
- Cloud impact of business processes.
- Studies in broader context.
- Impact of cloud providers.
Questions and comments
Key findings:
- Cloud adoption categories
- Set of empirically supported
adoption determinants
- Need for further studies:
- underrepresented categories
- broader context
- cloud providers
Asatiani, A. (2015). Why Cloud? –
A Review of Cloud Adoption
Determinants in Organizations.
23rd European Conference on
Information Systems (ECIS),
Münster, Germany, 2015.
http://aisel.aisnet.org/ecis2015_c
r/13/

More Related Content

What's hot

scientific-data-management-infographic
scientific-data-management-infographicscientific-data-management-infographic
scientific-data-management-infographicDavid Coe
 
Supporting the community-owned open scholarly communications ecosystem
Supporting the community-owned open scholarly communications ecosystemSupporting the community-owned open scholarly communications ecosystem
Supporting the community-owned open scholarly communications ecosystemJisc
 
Infrastructure As a Code (IAC) Jani Haapala 2017
Infrastructure As a Code (IAC) Jani Haapala 2017Infrastructure As a Code (IAC) Jani Haapala 2017
Infrastructure As a Code (IAC) Jani Haapala 2017Qentinel
 
2011-12-02 Open PHACTS at STM Innovation
2011-12-02 Open PHACTS at STM Innovation2011-12-02 Open PHACTS at STM Innovation
2011-12-02 Open PHACTS at STM Innovationopen_phacts
 
Pistoia Alliance conference April 2016: Big Data: Eric Little
Pistoia Alliance conference April 2016: Big Data: Eric LittlePistoia Alliance conference April 2016: Big Data: Eric Little
Pistoia Alliance conference April 2016: Big Data: Eric LittlePistoia Alliance
 
From Value to Vision: Reimagining the Possible with Data Analytics
From Value to Vision: Reimagining the Possible with Data AnalyticsFrom Value to Vision: Reimagining the Possible with Data Analytics
From Value to Vision: Reimagining the Possible with Data AnalyticsMIT Sloan Management Review
 
GDPR and test data challenge Antti Heimola 20170504
GDPR and test data challenge Antti Heimola 20170504GDPR and test data challenge Antti Heimola 20170504
GDPR and test data challenge Antti Heimola 20170504Qentinel
 
2018 ehr challenges
2018 ehr challenges2018 ehr challenges
2018 ehr challengesSapan Patel
 
Research/thesis poster
Research/thesis posterResearch/thesis poster
Research/thesis posterPavanPardeshi1
 
Data Integration- Query Driven Method
Data Integration- Query Driven MethodData Integration- Query Driven Method
Data Integration- Query Driven MethodSabbir Ahmed Saikat
 
Smart testing using virtual environments
Smart testing using virtual environmentsSmart testing using virtual environments
Smart testing using virtual environmentsFaris Nizamic
 
Annual Report-MDPI May Portuguez Castro.pdf
Annual Report-MDPI May Portuguez Castro.pdfAnnual Report-MDPI May Portuguez Castro.pdf
Annual Report-MDPI May Portuguez Castro.pdfMay Portuguez
 
Make a case for Data Classification in your organization
Make a case for Data Classification in your organizationMake a case for Data Classification in your organization
Make a case for Data Classification in your organizationWatchful Software
 
NOAA BDP Progress Update - Kearns CDAC Oct 2016.v2
NOAA BDP Progress Update - Kearns CDAC Oct 2016.v2NOAA BDP Progress Update - Kearns CDAC Oct 2016.v2
NOAA BDP Progress Update - Kearns CDAC Oct 2016.v2Edward Kearns
 
Cloud services - moving from tape to cloud
Cloud services - moving from tape to cloudCloud services - moving from tape to cloud
Cloud services - moving from tape to cloudIron Mountain
 
Moving from tape to cloud
Moving from tape to cloudMoving from tape to cloud
Moving from tape to cloudIron Mountain
 
F flack ands_ttt2_perth_phrn_17 may 2018_v1.0
F flack ands_ttt2_perth_phrn_17 may 2018_v1.0F flack ands_ttt2_perth_phrn_17 may 2018_v1.0
F flack ands_ttt2_perth_phrn_17 may 2018_v1.0ARDC
 

What's hot (20)

scientific-data-management-infographic
scientific-data-management-infographicscientific-data-management-infographic
scientific-data-management-infographic
 
Ba introduction
Ba introductionBa introduction
Ba introduction
 
Supporting the community-owned open scholarly communications ecosystem
Supporting the community-owned open scholarly communications ecosystemSupporting the community-owned open scholarly communications ecosystem
Supporting the community-owned open scholarly communications ecosystem
 
Infrastructure As a Code (IAC) Jani Haapala 2017
Infrastructure As a Code (IAC) Jani Haapala 2017Infrastructure As a Code (IAC) Jani Haapala 2017
Infrastructure As a Code (IAC) Jani Haapala 2017
 
2011-12-02 Open PHACTS at STM Innovation
2011-12-02 Open PHACTS at STM Innovation2011-12-02 Open PHACTS at STM Innovation
2011-12-02 Open PHACTS at STM Innovation
 
Pistoia Alliance conference April 2016: Big Data: Eric Little
Pistoia Alliance conference April 2016: Big Data: Eric LittlePistoia Alliance conference April 2016: Big Data: Eric Little
Pistoia Alliance conference April 2016: Big Data: Eric Little
 
From Value to Vision: Reimagining the Possible with Data Analytics
From Value to Vision: Reimagining the Possible with Data AnalyticsFrom Value to Vision: Reimagining the Possible with Data Analytics
From Value to Vision: Reimagining the Possible with Data Analytics
 
GDPR and test data challenge Antti Heimola 20170504
GDPR and test data challenge Antti Heimola 20170504GDPR and test data challenge Antti Heimola 20170504
GDPR and test data challenge Antti Heimola 20170504
 
2018 ehr challenges
2018 ehr challenges2018 ehr challenges
2018 ehr challenges
 
Ba introduction
Ba introductionBa introduction
Ba introduction
 
Research/thesis poster
Research/thesis posterResearch/thesis poster
Research/thesis poster
 
Data Integration- Query Driven Method
Data Integration- Query Driven MethodData Integration- Query Driven Method
Data Integration- Query Driven Method
 
Smart testing using virtual environments
Smart testing using virtual environmentsSmart testing using virtual environments
Smart testing using virtual environments
 
Annual Report-MDPI May Portuguez Castro.pdf
Annual Report-MDPI May Portuguez Castro.pdfAnnual Report-MDPI May Portuguez Castro.pdf
Annual Report-MDPI May Portuguez Castro.pdf
 
Make a case for Data Classification in your organization
Make a case for Data Classification in your organizationMake a case for Data Classification in your organization
Make a case for Data Classification in your organization
 
NOAA BDP Progress Update - Kearns CDAC Oct 2016.v2
NOAA BDP Progress Update - Kearns CDAC Oct 2016.v2NOAA BDP Progress Update - Kearns CDAC Oct 2016.v2
NOAA BDP Progress Update - Kearns CDAC Oct 2016.v2
 
Cloud services - moving from tape to cloud
Cloud services - moving from tape to cloudCloud services - moving from tape to cloud
Cloud services - moving from tape to cloud
 
Moving from tape to cloud
Moving from tape to cloudMoving from tape to cloud
Moving from tape to cloud
 
PathPresenter
PathPresenterPathPresenter
PathPresenter
 
F flack ands_ttt2_perth_phrn_17 may 2018_v1.0
F flack ands_ttt2_perth_phrn_17 may 2018_v1.0F flack ands_ttt2_perth_phrn_17 may 2018_v1.0
F flack ands_ttt2_perth_phrn_17 may 2018_v1.0
 

Similar to Why Cloud? - A Review Of Cloud Adoption Determinants In Organizations

Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...Rihab Rahman
 
ICELW Conference Slides
ICELW Conference SlidesICELW Conference Slides
ICELW Conference Slidestoolboc
 
2011 Digital Summit - Not So Cloudy - Agcaoili
2011 Digital Summit - Not So Cloudy - Agcaoili2011 Digital Summit - Not So Cloudy - Agcaoili
2011 Digital Summit - Not So Cloudy - AgcaoiliPhil Agcaoili
 
IT Compliance in 2015 - Beyond the “v” model
IT Compliance in 2015 - Beyond the “v” modelIT Compliance in 2015 - Beyond the “v” model
IT Compliance in 2015 - Beyond the “v” modelIGATE Corporation
 
A systems engineering methodology for wide area network selection
A systems engineering methodology for wide area network selectionA systems engineering methodology for wide area network selection
A systems engineering methodology for wide area network selectionAlexander Decker
 
ANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTING
ANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTINGANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTING
ANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTINGEditor IJMTER
 
Data Mining Framework for Network Intrusion Detection using Efficient Techniques
Data Mining Framework for Network Intrusion Detection using Efficient TechniquesData Mining Framework for Network Intrusion Detection using Efficient Techniques
Data Mining Framework for Network Intrusion Detection using Efficient TechniquesIJAEMSJORNAL
 
Who’s Keeping Score? A Quantitative Approach to Trial Feasibility
Who’s Keeping Score? A Quantitative Approach to Trial FeasibilityWho’s Keeping Score? A Quantitative Approach to Trial Feasibility
Who’s Keeping Score? A Quantitative Approach to Trial FeasibilitySaama
 
Final Project RequirementsSubmit your final project topic here. .docx
Final Project RequirementsSubmit your final project topic here. .docxFinal Project RequirementsSubmit your final project topic here. .docx
Final Project RequirementsSubmit your final project topic here. .docxlmelaine
 
Reliable Behavioural Factors in the Information SecurityCont.docx
Reliable Behavioural Factors in the Information SecurityCont.docxReliable Behavioural Factors in the Information SecurityCont.docx
Reliable Behavioural Factors in the Information SecurityCont.docxcarlt4
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksLiming Zhu
 
TUW-ASE-SUmmer 2014: Evaluating and Utilizing Data Concerns for DaaS
TUW-ASE-SUmmer 2014: Evaluating and Utilizing Data Concerns for DaaSTUW-ASE-SUmmer 2014: Evaluating and Utilizing Data Concerns for DaaS
TUW-ASE-SUmmer 2014: Evaluating and Utilizing Data Concerns for DaaSHong-Linh Truong
 
Exploring learning analytics: Jisc learning analytics service
Exploring learning analytics: Jisc learning analytics serviceExploring learning analytics: Jisc learning analytics service
Exploring learning analytics: Jisc learning analytics serviceJisc
 
Big data and Process Safety
Big data and Process Safety Big data and Process Safety
Big data and Process Safety cvandr4
 
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...Geoffrey Fox
 
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec GroupEXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec GroupFeroot
 

Similar to Why Cloud? - A Review Of Cloud Adoption Determinants In Organizations (20)

Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
 
De carlo rizk 2010 icelw
De carlo rizk 2010 icelwDe carlo rizk 2010 icelw
De carlo rizk 2010 icelw
 
ICELW Conference Slides
ICELW Conference SlidesICELW Conference Slides
ICELW Conference Slides
 
De carlo rizk 2010 icelw
De carlo rizk 2010 icelwDe carlo rizk 2010 icelw
De carlo rizk 2010 icelw
 
2011 Digital Summit - Not So Cloudy - Agcaoili
2011 Digital Summit - Not So Cloudy - Agcaoili2011 Digital Summit - Not So Cloudy - Agcaoili
2011 Digital Summit - Not So Cloudy - Agcaoili
 
Paper review
Paper review Paper review
Paper review
 
IT Compliance in 2015 - Beyond the “v” model
IT Compliance in 2015 - Beyond the “v” modelIT Compliance in 2015 - Beyond the “v” model
IT Compliance in 2015 - Beyond the “v” model
 
A systems engineering methodology for wide area network selection
A systems engineering methodology for wide area network selectionA systems engineering methodology for wide area network selection
A systems engineering methodology for wide area network selection
 
ANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTING
ANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTINGANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTING
ANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTING
 
Data Mining Framework for Network Intrusion Detection using Efficient Techniques
Data Mining Framework for Network Intrusion Detection using Efficient TechniquesData Mining Framework for Network Intrusion Detection using Efficient Techniques
Data Mining Framework for Network Intrusion Detection using Efficient Techniques
 
Who’s Keeping Score? A Quantitative Approach to Trial Feasibility
Who’s Keeping Score? A Quantitative Approach to Trial FeasibilityWho’s Keeping Score? A Quantitative Approach to Trial Feasibility
Who’s Keeping Score? A Quantitative Approach to Trial Feasibility
 
Final Project RequirementsSubmit your final project topic here. .docx
Final Project RequirementsSubmit your final project topic here. .docxFinal Project RequirementsSubmit your final project topic here. .docx
Final Project RequirementsSubmit your final project topic here. .docx
 
Reliable Behavioural Factors in the Information SecurityCont.docx
Reliable Behavioural Factors in the Information SecurityCont.docxReliable Behavioural Factors in the Information SecurityCont.docx
Reliable Behavioural Factors in the Information SecurityCont.docx
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risks
 
TUW-ASE-SUmmer 2014: Evaluating and Utilizing Data Concerns for DaaS
TUW-ASE-SUmmer 2014: Evaluating and Utilizing Data Concerns for DaaSTUW-ASE-SUmmer 2014: Evaluating and Utilizing Data Concerns for DaaS
TUW-ASE-SUmmer 2014: Evaluating and Utilizing Data Concerns for DaaS
 
Exploring learning analytics: Jisc learning analytics service
Exploring learning analytics: Jisc learning analytics serviceExploring learning analytics: Jisc learning analytics service
Exploring learning analytics: Jisc learning analytics service
 
Big data and Process Safety
Big data and Process Safety Big data and Process Safety
Big data and Process Safety
 
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
 
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec GroupEXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 

Recently uploaded

letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...Henry Tapper
 
VIP Call Girls Thane Sia 8617697112 Independent Escort Service Thane
VIP Call Girls Thane Sia 8617697112 Independent Escort Service ThaneVIP Call Girls Thane Sia 8617697112 Independent Escort Service Thane
VIP Call Girls Thane Sia 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...Suhani Kapoor
 
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfGale Pooley
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure servicePooja Nehwal
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130Suhani Kapoor
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfGale Pooley
 
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Pooja Nehwal
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spiritegoetzinger
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfAdnet Communications
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...Call Girls in Nagpur High Profile
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Sapana Sha
 

Recently uploaded (20)

letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
 
VIP Call Girls Thane Sia 8617697112 Independent Escort Service Thane
VIP Call Girls Thane Sia 8617697112 Independent Escort Service ThaneVIP Call Girls Thane Sia 8617697112 Independent Escort Service Thane
VIP Call Girls Thane Sia 8617697112 Independent Escort Service Thane
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024
 
Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
 
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
 
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdf
 
Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdf
 
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdf
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
 

Why Cloud? - A Review Of Cloud Adoption Determinants In Organizations

  • 1. Why Cloud? - A Review Of Cloud Adoption Determinants In Organizations Aleksandre Asatiani, Aalto University School of Business, Helsinki, Finland. ECIS 2015, Münster, Germany.
  • 2. Motivation - Inconclusive results across studies. - Lack of high-ranking publications on cloud adoption. - No thorough reviews summarizing empirical findings.
  • 4. Literature search - 7 databases: AISel; EBSCOHost; Google Scholar; Proquest; ScienceDirect; Scopus; Web of Science; - 6 search terms: “Cloud adoption“; “Cloud computing adoption“; “SaaS adoption“; “IaaS adoption“; “PaaS adoption”; “XaaS adoption“; - 5 criteria: Published peer-reviewed articles; original empirical studies; adoption in organizations; clearly identified adoption factors;
  • 5. Search results - 76 articles after manual review of titles and abstracts. - 31 articles for the first step of the review. - 18 articles for the second step of the review.
  • 6. Step 1 Goal: Identify cloud adoption factors used in previous studies. Approach: Concept matrices – identify, code, group. Outcome: 5 adoption categories, 43 adoption factors.
  • 7. Step 2 Goal: Explore empirical evidence behind adoption factors and adoption decision. Approach: Systematic review (Jeyaraj et al. 2006). Outcome: Set of cloud adoption determinants.
  • 9. Adoption factors categories Drivers 11 items 1. Cost advantage 2. Relative advantage 3. Accessibility 4. Strategic flexibility & adaptability 5. Implementation times Barriers 14 items 1. Security & privacy 2. Cost unpredictability 3. Complexity 4. Lack of standards in SLAs 5. Technological limitations Organization 7 items 1. Compatibility 2. Management support 3. Organization size 4. Transaction costs 5. Previous experience with cloud Cloud Providers 5 items 1. Provider reputation 2. Provider competences 3. Customer support 4. Economics of scale 5. Location of data External factors 6 items 1. Legal issues 2. Competitive pressure 3. Social influence/peer pressure 4. Shared best practices 5. Partner pressure
  • 10. Determinants of adoption argued in case of qualitative studies, relationships between independent variables and adoption of cloud. I used the five categories created on the first step of the analysis to draw a framework for summarizing findings (Figure 2). These findings present determinants of cloud adoption, which proved as relatively reliable predictors, backed up by empirical evidence. Adoption of cloud Drivers of adoption Cost advantage ++ Fast implementation ++ Opportunities for innovation ++ Strategic flexibility + Focus on core competences+ Accessibility + Trialability + Relative advantage + Online collaboration + Inhibitors of adoption Security & privacy -- Performance risks -- Economic risks -- Lock-in – Organization Management support ++ Attitudes towards technology + External environment Partner pressure ++ Cloud providers Provider reputation ++ (++) More than 80% of the evidence is positively significant (+) 60% to 80% of the evidence is positively significant (--) More than 80% of the evidence is negatively significant (-) 60% to 80% of the evidence is negatively significant Figure 2. Cloud adoption determinants based on cloud adoption literature. After coding relationships according to a direction and significance, I followed Jeyaraj et al. (2006),
  • 11. Future research - Further exploration of underrepresented categories. - Cloud impact of business processes. - Studies in broader context. - Impact of cloud providers.
  • 12. Questions and comments Key findings: - Cloud adoption categories - Set of empirically supported adoption determinants - Need for further studies: - underrepresented categories - broader context - cloud providers Asatiani, A. (2015). Why Cloud? – A Review of Cloud Adoption Determinants in Organizations. 23rd European Conference on Information Systems (ECIS), Münster, Germany, 2015. http://aisel.aisnet.org/ecis2015_c r/13/